Skip to main content

Posts

Showing posts from 2012

Microsoft to Kill the Messenger, Supplant It With Skype

Microsoft to Kill the Messenger, Supplant It With Skype After buying Skype last year, Microsoft has decided to put it to good use as a replacement for Windows Live Messenger. "The end result is you get something that's more universal than what you had before and with quite more capability," said Rob Enderle, principal analyst at the Enderle Group. Microsoft will phase out Windows Live Messenger, its consumer instant messaging platform, over the next several months as its users are moved to Skype, the company announced this week. Microsoft hopes to smooth the transition to Skype for Live Messenger users by allowing them to log in to Skype with their Microsoft ID so that contacts in one program will automatically transfer to the other. The move to Skype will be beneficial to Live Messenger users, said Microsoft spokesperson Dani Reese. Bringing together Messenger and Skype contacts within Skype provides a richer and easier way for users to communicate

How to get Google Adsense account fast and easy for a blog without wait

Airline, Myspace, Banks, Goverment Websites Vulnerable To Hackers   Cross Site Scripting (XSS) is currently the most common vulnerability in the world. This is vulnerability of some host which allows anyone to inject code/scripts into the page. The injected scripts could be html tags, javascript script, vbscript scripts. A Hacker with virtual name 'Human mind cracker' expose similar vulnerabilities in some big and Important sites, like Israel airline, Myspace, MTV website, Sweden government, Bangladesh bank, Nasa subdomain, Brown University, Afghanistan government website and Rome government website. In a pastebin note, hacker disclose the vulnerabilities and exact working links. These Cross Site Scripting existence is because of the lack of filtering engines to user inputs at websites, forms and web servers. Most of the time readers thinks that XSS is a very minor bug and having very less impact. But if implemented in a better way, that can harm all the visitors who wil

Indian Security Agencies Taking Offensive Mode For Cyber Security

Indian Security Agencies Taking Offensive Mode For Cyber Security India is set to take steps to protect its cyber infrastructure and designate agencies for carrying out offensive cyber attacks on other countries. Indian Government announce the appointment of   first coordinator for The National cyber security agency. Mr. Gulshan Rai , who presently heads the Indian Computer Emergency Response Team (CERT-IN), will be the first coordinator. The move comes at a time when proof shows countries launching cyber attacks not only for intelligence gathering and many nations describing the attacks as an act of war. "The plan is in final stages with certain legal issues being clarified. Among the issues are some objections to the legal powers of the proposed National Critical Information Infrastructure Protection Centre (NCIPC), a command-and-control centre for monitoring the critical infrastructure. NCIPC is to be managed by the technical intelligence agency NTRO (National Technical R

Big US Banks Under Active Attack, Napolitano Warns

Big US Banks Under Active Attack, Napolitano Warns The shutdown of New York's financial sector caused by Hurricane Sandy is a stark reminder of how much tumult a human-generated disruption also could cause, said Avivah Litan, security analyst at Gartner. "The fact that the stock market had to close for two days because of a hurricane should be a wake-up call that we are largely unprepared for a major cyberwar." Considering Live Chat For Your Company? Which live chat solution is right for you? Find out now with the new Live Chat Comparison 2012 Report. Download the free report. Hackers are actively attacking some of the largest banks in the nation, U.S. Homeland Security Secretary Janet Napolitano warned this week. Napolitano declined to go into detail about the types of breaches or what kind of information -- if any -- had been taken. She brought up her concern about attacks on U.S. financial institutions at a cybersecurity event. The federal government is aware of t

Microsoft's Hitting the Hard Stuff

Microsoft's Hitting the Hard Stuff               With a few notable exceptions, Microsoft has left the hardware to its partners, but that could be changing. Rumor has it Redmond is planning to develop its own signature smartphone. That could be because it's worried its partners won't come through with anything great, though it says it really believes in them, or it could just be that Microsoft wants to be more like Google -- or Apple. Microsoft could be developing its own Windows Phone hardware, according to media reports that surfaced on Friday. The software giant is reportedly working with Asian suppliers to create a new handset. While Microsoft has several partners that are bringing out Windows Phone 8 devices, including Nokia and HTC, this would be the company's first foray into the handset market as a hardware manufacturer. Microsoft has not publicly acknowledged the rumors. "We are big believers in our hardware partners, and together we're focused

New Computer Technology

Latest New Computer Technology

Court Orders Apple to Revise Cheeky Apology

Court Orders Apple to Revise Cheeky Apology Apple has been ordered to post a new statement on its UK website after the original one declaring that Samsung didn't copy its tablet design didn't meet with the judges' approval. "The court may not have been perfectly happy about Apple's statement, but it was 100 percent truthful and in the free world everyone should be free to say accurate things," said intellectual property analyst Florian Mueller. The British court that ordered Apple to post a statement declaring that Samsung didn't infringe on its designs isn't happy with the way the order was carried out. Apple posted a statement to its UK website, but it was apparently not what the three-judge appeals panel had in mind. The proclamation has one paragraph about Samsung's non-infringement of Apple's registered design, but it follows up with some other content that irked the UK justices. One paragraph, for example, lifted from a lower court rul

Taking the Windows 8 Plunge

Taking the Windows 8 Plunge Windows RT is only available pre-installed on ARM-processor tablets and PCs. Choose Windows 8 Pro if you want an OS oriented to data protection, remote desktop connection or corporate network connections. All of the Windows 8 operating systems are touch-enabled, although you need a PC that supports multitouch to use it. Considering Live Chat For Your Company? Which live chat solution is right for you? Find out now with the new Live Chat Comparison 2012 Report.  Download the free report.  If you're used to Microsoft's stratospheric pricing email program -- Outlook alone is US$139.99 estimated retail -- take a look at the small print at Microsoft's Windows 8 website, and you'll see that a Windows 8 Pro upgrade can be downloaded for a limited-time at the measly price of $39.99. This is a surprising bargain from the monolith -- and a significant change in direction from the $100-plus upgrades we've been used to.

New Latest Technology Phone-(Tronatic)

New Latest Technology Phone-(Tronatic)

Microsoft's Big Gamble Could Be Linux's Big Shot

Microsoft's Big Gamble Could Be Linux's Big Shot "I think there is an opening, but it may close quickly," said Google+ blogger Kevin O'Brien. "People who try Windows 8 on a desktop or laptop will hate it, but that is what will be pre-loaded. If they want Windows 7, they will have to actually purchase it, which most of them have never done. That is where Linux has an opening." Now that Windows 8 has made its long-awaited and widely trumpeted debut, there seems to be a fresh air of excitement and purpose here in the Linux blogosphere. This, of course, is not to say that many of us here are particularly excited about Microsoft's new OS, per se. Quite the opposite, in fact: Many of us are excited about the opportunity Win 8 means for Linux. "In the past the Linux has failed to capitalize on Microsoft's errors and capture new users," explained the TuxRadar crew in a new Open Ballot poll, for example. "We want to know what you thin

New Latest Technology

New Latest Technology  

Iceland: Where Citizens Govern via Facebook

Iceland: Where Citizens Govern via Facebook Iceland has involved its citizens in many forms of crowdsourced government, said Icelandic journalist Paul Fontaine. "Apart from the National Assembly, which is definitely an example of crowdsourcing, there is also Better Reykjavik, and that is a very literal example of crowdsourcing. Suggestions are invited from the general public on this website about changes they would like to see to the city." Iceland recently drafted a new constitution, a noteworthy event (a) because new constitutions aren't all that common and (b) because citizens were invited to participate via social networking sites. While not Iceland's most pure example of crowdsourcing, the constitutional update made extensive use of public input. In fact, Iceland has responded to the current financial crisis -- which hit the small nation hard -- by inviting the public to take part in a number of initiatives to improve government. In this TechNewsWorld podcas

Google's Neverending Big Adventure

Google's Neverending Big Adventure   Why would Google want to send its Street View cameras into a vast crack in the Earth where there's nary a street to be found? It can't be as simple as "because it can." There must be some financial motive. Perhaps -- but monetization "is not how Google typically thinks about it," said tech analyst Greg Sterling. "This is part of the logic of Google's mission to map the real world in a complete way." In its ongoing effort to create the perfect map of the world at ground level, Google took a trek into the Grand Canyon this week. Although this is part of its Google Maps Street View project, there are of course no streets in the national park. Google Street View Product Manager Ryan Falor Google Street View Product Manager Ryan Falor controls the Trekker with his Android device. Earlier this month, Google announced that it had doubled the number of special collections in its Street View catalo

Asus Puts Its Windows 8 Lineup on the Top Shelf

Asus Puts Its Windows 8 Lineup on the Top Shelf        The high end of the market is Asus's stomping ground, and without the enterprise connections of competitors such as Dell, it's well advised to try to appeal to individuals looking for distinctive yet powerful devices, said Forrester analyst Dave Johnson. "Their best bet is to continue to appeal to premium consumers." Asus unveiled its slew of new products Tuesday, showing off touch-capable PCs, hybrids, tablets and convertible Ultrabooks optimized to run on Microsoft's new Windows 8 operating system. Asus Taichi The Asus Taichi, one of a new line of Windows 8 systems announced by Asus Windows is getting a radical redesign, and many of Asus's new products follow suit, featuring dramatic differences from previous PC and tablet models. One example is the Taichi, a dual-screen laptop with two 1080p IPS screens. The convertible Ultrabook can be used in laptop mode or with the lid closed, like a tablet. T

Open Source Ammo for the SMB Security Arsenal

Open Source Ammo for the SMB Security Arsenal   In many cases, open source security software can fill the gap when funding for heavy, commercially supported, closed-source security tools is hard to come by. For SMBs, having a few open source security tools in their back pocket to meet specific security challenges can be a godsend. Technology professionals who work in and around SMBs know that sometimes bringing up information security in a smaller IT shop can be a tough sell. In many cases, SMBs feel that they don't present an attractive or large enough target for hackers to be interested in them. For example, a small community bank or credit union might believe that only a large bank needs to worry about fraud; a small local retailer might think only the big chains need to worry about security. In practice, nothing could be farther from the truth. Not only are SMBs actively attacked, they're also in some categories attacked more often (or at least more successfully) th

The Revolution from Cyber Terrorist attack to Indian Cyber Security

The Revolution from Cyber Terrorist attack to Indian Cyber Security Cyber attack has put our lives in danger every second. The cyber attacks are becoming the root cause of the mishappenings around us every other day. As the next generation wars are increasing depending on robust and secure information systems networks, it is imperative for a country to invest in building a reliable infrastructure. As the next generation wars are increasing depending on robust and secure information systems networks, it is imperative for a country to invest in building a reliable infrastructure. Increasing attacks on cyberspace in India has brought several professionals and experts from the Industry, in support with the last week, India’s Defense Minister, AK Antony, announced an additional $1.3 Billion will be invested in the project making the grand total to a $3.1 Billion. It is observed that many Electronic Notification is usually sent before a major terrorist attack, followed by defacement of g

To India, - From Anonymous

To India, - From Anonymous   Related Videos: Did you know? Technology. Crazy Multi-Input Touch Screen CRISC is the Certification for Risk Professionals THE COMPUTER FUTURE TECHNOLOGY!   Life In A Day

Did you know? Technology.

Did you know? Technology.  

Red Alert: Chinese Telecoms and Cyberattack Jitters

Red Alert: Chinese Telecoms and Cyberattack Jitters "Since so much of our economy is driven by the use of telecommunications and Internet providers and whatnot, I think that's why people are getting really, really nervous about a company where we have a strained relationship with their home country," said author Brian Proffitt. The House Intelligence Committee's investigation into Chinese telecommunications giants Huawei and ZTE climaxed last week, concluding, essentially, that the Chinese firms aren't to be trusted. That set off a spate of stories, including on-the-record denials from Huawei and reports that, for the last year, U.S. telecoms have waged a campaign against their Chinese competitors. That U.S. Defense Secretary Leon Panetta announced that a "cyber Pearl Harbor" could be on the horizon only fanned the cybersecurity storyline. Listen to this week's podcast about cybersecurity in general -- and China in particular -- featuring Brian